Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore eight command and control (C2) tools through comprehensive analysis of their communication methods and detection strategies in this 43-minute conference talk. Examine Metasploit, Mythic, Merlin, CobaltStrike, Sliver, BruteRatel, DropboxC2C, and SaucePot C2 to understand how these tools operate and how security professionals can identify their presence. Learn behavior-based detection methods, network traffic analysis techniques, and machine learning approaches for identifying C2 communications. Discover practical defense techniques that can be implemented to strengthen organizational cyber resilience against these sophisticated threat actor tools. Gain insights from a principal threat researcher's perspective on the evolving landscape of command and control infrastructure and the corresponding defensive measures needed to combat modern cyber threats.
Syllabus
Walk Through Eight C2 Tools in 50 Mins
Taught by
RSA Conference